Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 14:52

General

  • Target

    2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe

  • Size

    34KB

  • MD5

    ec280917e09b494eb6abbda0d729cd0d

  • SHA1

    f7007675c1346bf95e8d5bf1ba8aed03442d0e62

  • SHA256

    fda0b0b9094ec753b16373c64b71ccf5a16ea1f076779c9f74a7b6a192661aad

  • SHA512

    5a7bb59061f97bcd9760a98a45d69807272386b96a791e6cd4143806aab544ed583ebb84df1e835ddeccdffc8f1a0b3ba575ab56420accb47fc5f80082e5b952

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RwFtzxt16g:b7o/2n1TCraU6GD1a4Xt9bRwrbF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    34KB

    MD5

    8f68afc075e33bd5151c424ddc014ffb

    SHA1

    f0b4738c1cca167d475fc79922b9f334f17666ab

    SHA256

    958df3caffbed78410b8439475b30259ac14f7f7670d73105873c7238517caf0

    SHA512

    9c6b39ef68c77a60da61c9e49fb068f75ad42cb53c2f0dec3e880f4b96d0a4dfa18a450f24dda4a14a6ea4c089b4e9a2fd9e1e20ad2de44fe7626ffbec1ec144

  • memory/1472-22-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/3684-0-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/3684-1-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/3684-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB